General
-
Target
475604a43c345971022ae3da673840556e6a65e9355ca2376cc3b81b65bbce3f
-
Size
349KB
-
Sample
220520-2ptq1sagem
-
MD5
4ba3b7693391fa5d8326b686692a9f91
-
SHA1
bfe26b996c5a1176896cbd82ef8044af25042720
-
SHA256
475604a43c345971022ae3da673840556e6a65e9355ca2376cc3b81b65bbce3f
-
SHA512
de6c30aa11c1cc63947566b5bcbed45dbefce9d9edabadb069b14157bf64d9aad87bcc92e9453f89e7b5b3858a87d41deb7dc3f288db9430aad0e64dfeddeb1d
Behavioral task
behavioral1
Sample
475604a43c345971022ae3da673840556e6a65e9355ca2376cc3b81b65bbce3f.exe
Resource
win7-20220414-en
Malware Config
Extracted
darkcomet
maincraft
petyx.ddns.net:7895
duxa.ddns.net:7895
DC_MUTEX-P0HW8GA
-
InstallPath
MSDCSC\Windows.exe
-
gencode
RbtaWfmoGPRb
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
475604a43c345971022ae3da673840556e6a65e9355ca2376cc3b81b65bbce3f
-
Size
349KB
-
MD5
4ba3b7693391fa5d8326b686692a9f91
-
SHA1
bfe26b996c5a1176896cbd82ef8044af25042720
-
SHA256
475604a43c345971022ae3da673840556e6a65e9355ca2376cc3b81b65bbce3f
-
SHA512
de6c30aa11c1cc63947566b5bcbed45dbefce9d9edabadb069b14157bf64d9aad87bcc92e9453f89e7b5b3858a87d41deb7dc3f288db9430aad0e64dfeddeb1d
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Disables RegEdit via registry modification
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-